AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Intro
This chapter examines critical security vulnerabilities in Clio file transfer appliances and their exploitation by ransomware groups like Termite. The discussion emphasizes the implications of these issues for the overall cybersecurity landscape and the effectiveness of existing defenses.
On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
This week’s episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him!
This episode is also available on Youtube.
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode